Fortinet is alerting customers of a critical security flaw in FortiSIEM for which it said there exists an exploit in the wild.
The vulnerability, tracked as CVE-2025-25256, carries a CVSS score of 9.8 out of a maximum of 10.0.
"An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in FortiSIEM may allow an unauthenticated attacker to execute unauthorized code or commands via crafted CLI requests," the company said in a Tuesday advisory.
The following versions are impacted by the flaw -
- FortiSIEM 6.1, 6.2, 6.3, 6.4, 6.5, 6.6 (Migrate to a fixed release)
- FortiSIEM 6.7.0 through 6.7.9 (Upgrade to 6.7.10 or above)
- FortiSIEM 7.0.0 through 7.0.3 (Upgrade to 7.0.4 or above)
- FortiSIEM 7.1.0 through 7.1.7 (Upgrade to 7.1.8 or above)
- FortiSIEM 7.2.0 through 7.2.5 (Upgrade to 7.2.6 or above)
- FortiSIEM 7.3.0 through 7.3.1 (Upgrade to 7.3.2 or above)
- FortiSIEM 7.4 (Not affected)
Fortinet acknowledged in its advisory that a "practical exploit code for this vulnerability was found in the wild," but did not share any additional specifics about the nature of the exploit and where it was found. It also noted that the exploitation code does not appear to produce distinctive indicators of compromise (IoCs).
As workarounds, the network security company is recommending that organizations limit access to the phMonitor port (7900).
The disclosure comes a day after GreyNoise warned of a "significant spike" in brute-force traffic aimed at Fortinet SSL VPN devices, with dozens of IP addresses from the United States, Canada, Russia, and the Netherlands probing devices located across the world.
Update
In a follow-up analysis, watchTowr Labs said phMonitor is a C++ binary that's responsible for monitoring the health of FortiSIEM processes. It works by listening on port 7900, using a custom RPC protocol wrapped in TLS.
The vulnerability, the cybersecurity company added, is rooted in a function named "phMonitorProcess::handleStorageArchiveRequest" and stems from an inadequate sanitization of user inputs, which could then be exploited to achieve command injection.
"Under the hood, addParaSafe simply escaped quotes to try and stop input from breaking out of a surrounding literal string – a weak defense against command injection," security researcher Sina Kheirkhah said.
As a result, an attacker could weaponize the flaw by supplying a specially crafted XML payload to run arbitrary shell commands on the underlying operating system.
(The story was updated after publication on August 18, 2025, to include an analysis of the flaw from watchTowr Labs.)